Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search

被引:101
|
作者
Wang, Haijiang [1 ]
Dong, Xiaolei [2 ]
Cao, Zhenfu [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Keyword search; Encryption; Servers; Cloud computing; Access control; Public key; Ciphertext-policy attribute-based encryption; searchable encryption; commercial applications; multi-value-Independent; fast keyword search;
D O I
10.1109/TSC.2017.2753231
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
ABKS has drawn much attention from research and industry in recent years, an ABKS scheme is an encryption scheme that supports keyword search and access control. Attribute-Based Encryption is a public key encryption that enables users to encrypt and decrypt message based on attributes. In a typical implementation, the size of the ciphertext is proportional to the number of attributes associated with it and the decryption time is proportional to the number of attributes used during decryption. Inherit from ABE technology, the computation cost and ciphertext size in most ABKS schemes grow with the complexity of the access policy. On the other hand, we found that the traditional ABKS schemes cannot resist our secret-key-recovery attack. To deal with the above problems, we present new ciphertext policy attribute based encryption with fast keyword search constructions. Our constructions preserve the fine-grained access control inherited from the ABE system while supporting hidden policy and fast keyword search. Our constructions feature multi-value-independent compared with the existing attribute based searchable encryption schemes. The performance analysis demonstrates the efficiency of our constructions. We offer rigorous security proof of our second scheme, which is IND-CKA and IND-CPA secure.
引用
收藏
页码:1142 / 1151
页数:10
相关论文
共 50 条
  • [41] Efficient and Secure Ciphertext-Policy Attribute-Based Encryption Without Pairing for Cloud-Assisted Smart Grid
    Wang, Yong
    Chen, Biwen
    Li, Lei
    Ma, Qiang
    Li, Huicong
    He, Debiao
    IEEE ACCESS, 2020, 8 : 40704 - 40713
  • [42] Large Universe Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
    Sun, Lei
    Wang, Shuaili
    Li, Zuohui
    Wang, Guangbo
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, AUTOMATION AND MECHANICAL ENGINEERING (EAME 2017), 2017, 86 : 243 - 249
  • [43] Expressive ciphertext-policy attribute-based encryption with direct user revocation
    Bai C.
    Zhang Y.
    Ma H.
    Liu Z.
    International Journal of Embedded Systems, 2017, 9 (06) : 495 - 504
  • [44] Enhancing Data Privacy Protection in Ciphertext-Policy Attribute-Based Encryption
    Patil, Sachin Popat
    Basthikodi, Mustafa
    Kumaraswamy, S.
    Gurpur, Ananth Prabhu
    Raga, Akashraj
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 1113 - 1124
  • [45] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Hao Wang
    Debiao He
    Jian Shen
    Zhihua Zheng
    Chuan Zhao
    Minghao Zhao
    Soft Computing, 2017, 21 : 7325 - 7335
  • [46] Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
    Wang, Hao
    He, Debiao
    Shen, Jian
    Zheng, Zhihua
    Zhao, Chuan
    Zhao, Minghao
    SOFT COMPUTING, 2017, 21 (24) : 7325 - 7335
  • [47] A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram
    Li, Long
    Gu, Tianlong
    Chang, Liang
    Xu, Zhoubo
    Liu, Yining
    Qian, Junyan
    IEEE ACCESS, 2017, 5 : 1137 - 1145
  • [48] Dynamic Time and Location Information in Ciphertext-Policy Attribute-Based Encryption with Multi-Authorization
    Nayudu, P. Prathap
    Sekhar, Krovi Raja
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (03) : 3801 - 3813
  • [49] Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation
    Ghopur, Dilxat
    Ma, Jianfeng
    Ma, Xindi
    Miao, Yinbin
    Hao, Jialu
    Jiang, Tao
    SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (07)
  • [50] Updatable Ciphertext-Policy Attribute-Based Encryption Scheme With Traceability and Revocability
    Liu, Zhenhua
    Xu, Jing
    Liu, Yan
    Wang, Baocang
    IEEE ACCESS, 2019, 7 : 66832 - 66844